article thumbnail

WeSteal, a shameless commodity cryptocurrency stealer available for sale

Security Affairs

They will often describe potential “legitimate” uses for their malware – only to further describe anti-malware evasion properties, silent installation and operation or features such as cryptocurrency mining, password theft or disabling webcam lights.” ” reads the post published by Palo Alto Networks. ” concludes the report.

Sales 107
article thumbnail

NEW TECH: LogicHub introduces ‘virtualized’ security analysts to help elevate SOAR

The Last Watchdog

Stuck in a rut Enter SOAR, which takes well-understood data mining and business intelligence analytics methodologies and applies them to cybersecurity. Living off the land’ LogicHub aims to be at the leading edge of this emerging market. “The In this milieu, even well-defended enterprises continue to suffer catastrophic data breaches.

Security 159